Описание
qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.5.0+dfsg-3ubuntu2 |
| esm-infra-legacy/trusty | not-affected | 1.5.0+dfsg-3ubuntu2 |
| esm-infra/xenial | not-affected | 1.5.0+dfsg-3ubuntu2 |
| hardy | ignored | end of life |
| lucid | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| raring | ignored | end of life |
| saucy | not-affected | 1.5.0+dfsg-3ubuntu2 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | ignored | end of life |
| oneiric | ignored | end of life |
| precise | ignored | |
| quantal | ignored | end of life |
| raring | DNE | |
| saucy | DNE | |
| trusty | DNE |
Показывать по
EPSS
3.3 Low
CVSS2
Связанные уязвимости
qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw ...
qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
EPSS
3.3 Low
CVSS2